Sciweavers

327 search results - page 24 / 66
» Comparative News Summarization Using Linear Programming
Sort
View
POPL
2008
ACM
15 years 10 months ago
Generating precise and concise procedure summaries
We present a framework for generating procedure summaries that are precise -- applying the summary in a given context yields the same result as re-analyzing the procedure in that ...
Greta Yorsh, Eran Yahav, Satish Chandra
59
Voted
TOPLAS
2002
89views more  TOPLAS 2002»
14 years 9 months ago
Efficient and precise array access analysis
A number of existing compiler techniques hinge on the analysis of array accesses in the program. The most important task in array access analysis is to collect the information abo...
Yunheung Paek, Jay Hoeflinger, David A. Padua
ICIP
2008
IEEE
15 years 4 months ago
Detection of +/-1 LSB steganography based on the amplitude of histogram local extrema
Recently Zhang et al described an algorithm for the detection of ±1 LSB steganography based on the statistics of the amplitudes of local extrema in the greylevel histogram. Exper...
Giacomo Cancelli, Gwenaël J. Doërr, Inge...
86
Voted
ISCAS
2007
IEEE
152views Hardware» more  ISCAS 2007»
15 years 3 months ago
Reduced Complexity Space-Time-Frequency Model for Multi-Channel EEG and Its Applications
— Searching for an efficient summarization of multi-channel electroencephalogram (EEG) behavior is a challenging signal analysis problem. Recently, parallel factor analysis (PAR...
Yodchanan Wongsawat, Soontorn Oraintara, K. R. Rao
IJNSEC
2007
119views more  IJNSEC 2007»
14 years 9 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...